<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Google-Cloud-Storage — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/google-cloud-storage/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 15 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/google-cloud-storage/feed.xml" rel="self" type="application/rss+xml"/><item><title>Phishing Campaign Abusing Google Cloud Storage Redirectors</title><link>https://feed.craftedsignal.io/briefs/2026-03-google-cloud-storage-redirector/</link><pubDate>Sun, 15 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-google-cloud-storage-redirector/</guid><description>A phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.</description><content:encoded><![CDATA[<p>An ongoing phishing campaign observed in March 2026 abuses Google Cloud Storage (storage.googleapis.com) as a redirector. Attackers are using this service to proxy victims to various scam pages. These scam pages are primarily hosted on domains ending in .autos. The campaign employs various phishing themes, including fake Walmart surveys, Dell giveaways, Netflix rewards, antivirus renewal alerts, storage full warnings, and fake job lures. This tactic allows attackers to obfuscate the final destination of the phishing link, making it harder for victims to identify malicious content before they are redirected to a scam page. Defenders should monitor for unusual redirects originating from Google Cloud Storage to untrusted domains.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email to potential victims.</li>
<li>The email contains a link that appears legitimate, hosted on Google Cloud Storage (storage.googleapis.com).</li>
<li>The victim clicks on the link, initiating a request to the specified Google Cloud Storage URL.</li>
<li>Google Cloud Storage, configured by the attacker, redirects the victim to a malicious domain, typically ending in .autos.</li>
<li>The victim&rsquo;s browser is redirected to the scam page hosted on the .autos domain.</li>
<li>The scam page presents a fake survey, giveaway, reward, alert, or job lure designed to trick the victim.</li>
<li>The victim enters personal information or credentials into the fake form.</li>
<li>The attacker harvests the stolen information for malicious purposes, such as identity theft or financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This phishing campaign can lead to the theft of personal and financial information. Victims who interact with the scam pages may experience financial losses, identity theft, or malware infections. The use of Google Cloud Storage as a redirector makes it harder to detect and block these phishing attacks, potentially impacting a large number of users. Sectors targeted include retail customers (Walmart), technology consumers (Dell, Netflix), and job seekers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for redirects originating from <code>storage.googleapis.com</code> to suspicious domains, particularly those ending in <code>.autos</code>.</li>
<li>Implement the Sigma rule to detect redirects from Google Cloud Storage to .autos domains.</li>
<li>Educate users about phishing tactics and the dangers of clicking on suspicious links.</li>
<li>Consider blocking or sandboxing domains ending in <code>.autos</code> if they are not part of your organization&rsquo;s trusted ecosystem.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>redirect</category><category>google-cloud-storage</category></item></channel></rss>